mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
62 lines
1.9 KiB
JSON
62 lines
1.9 KiB
JSON
![]() |
{
|
||
|
"data_type": "CVE",
|
||
|
"data_format": "MITRE",
|
||
|
"data_version": "4.0",
|
||
|
"CVE_data_meta": {
|
||
|
"ID": "CVE-2018-20812",
|
||
|
"ASSIGNER": "cve@mitre.org",
|
||
|
"STATE": "PUBLIC"
|
||
|
},
|
||
|
"affects": {
|
||
|
"vendor": {
|
||
|
"vendor_data": [
|
||
|
{
|
||
|
"product": {
|
||
|
"product_data": [
|
||
|
{
|
||
|
"product_name": "n/a",
|
||
|
"version": {
|
||
|
"version_data": [
|
||
|
{
|
||
|
"version_value": "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"vendor_name": "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
"problemtype": {
|
||
|
"problemtype_data": [
|
||
|
{
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "eng",
|
||
|
"value": "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"references": {
|
||
|
"reference_data": [
|
||
|
{
|
||
|
"refsource": "CONFIRM",
|
||
|
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/",
|
||
|
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"description": {
|
||
|
"description_data": [
|
||
|
{
|
||
|
"lang": "eng",
|
||
|
"value": "An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints."
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|